searchtwitterarrow rightmail strokearrow leftmail solidfacebooklinkedinplusangle upmagazine plus
Help Net Security - Daily information security news with a focus on enterprise security.
  • News
  • Features
  • Expert analysis
  • Reviews
  • Events
  • Whitepapers
  • Industry news
  • Newsletters
  • (IN)SECURE Magazine

law enforcement

Get our top stories in your inbox

International law enforcement effort pulls off Emotet botnet takedown

January 27, 2021

Law enforcement and judicial authorities worldwide have effected a global takedown of the Emotet botnet, Europol announced today. “The Emotet infrastructure essentially …

Hackers helping communities: Leveraging OSINT to find missing persons

November 18, 2019

People, in general, like helping other people, no matter their degree of connection. And then there are people who go even further: they find a way to help people help people. …

Europol: Spear phishing the most prevalent cyber threat affecting orgs across the EU

November 4, 2019

Spear phishing describes the practice of targeting specific individuals within an organisation or business for the purposes of distributing malware or extracting sensitive …

Targeted online messaging dissuading young gamers from getting involved in cybercrime

October 22, 2019

Highly-targeted messaging campaigns from law enforcement can be surprisingly effective at dissuading young gamers from getting involved in cybercrime, a new study has …

281 BEC scammers arrested in worldwide law enforcement action

September 11, 2019

Federal authorities announced a significant coordinated effort to disrupt Business Email Compromise (BEC) schemes that are designed to intercept and hijack wire transfers from …

FileTSAR: Free digital forensic investigations toolkit for law enforcement

April 8, 2019

Purdue University cybersecurity experts have created FileTSAR, an all-in-one digital forensic investigations toolkit for law enforcement. About FileTSAR FileTSAR, which stands …

Sharp rise in email and social media hacking in the UK

December 3, 2018

Police forces across the UK are coming under increasing pressure to launch criminal investigations into incidents of social media and computer hacking, according to a new …

Idaho inmates hacked prison system to add money to their accounts

July 30, 2018

364 inmates at five correctional facilities in Idaho have managed to add nearly a quarter million dollars worth of credit to their JPay accounts by exploiting a vulnerability …

Apple releases security updates, adds new privacy protection for iOS users

July 10, 2018

Apple has released new versions of its many operating systems and software products, with fixes for a wide variety of vulnerabilities. The iOS update also comes with USB …

UK govt announces specialized cybercrime court in London

July 9, 2018

It is just a matter of time until specialized courts for cybercrime cases pop up, and the UK is already working on one. The new court will be located in the heart of the City …

Dramatic increase in cryptocurrency money laundering

July 6, 2018

Three times more cryptocurrency was stolen from exchanges in the first half of 2018 than in all of 2017, according to CipherTrace. These dirty funds all need to be …

The IEEE is against mandated encryption backdoors

June 28, 2018

The Institute of Electrical and Electronics Engineers (IEEE) has added its voice to the chorus of security experts, privacy advocates, lawmakers and other prominent …

Posts navigation

1 2 3 4 5
architecture

Why enterprises need rugged devices with integrated endpoint management systems

  • Five factors driving investment in IDV
  • 2021 will be the year of hybrid working: How can CTOs keep staff secure and productive?
Whitepaper – EDR to secure mobile devices: Coverage, limits & recommendations

What's new

vmware

Attackers are looking to exploit critical VMware vCenter Server RCE flaw, patch ASAP!

hand

Attackers disrupting COVID-19 efforts and critical supply chains

identity

Five factors driving investment in IDV

architecture

Why enterprises need rugged devices with integrated endpoint management systems

Don't miss

vmware

Attackers are looking to exploit critical VMware vCenter Server RCE flaw, patch ASAP!

architecture

Why enterprises need rugged devices with integrated endpoint management systems

identity

Five factors driving investment in IDV

tracking

CNAME-based tracking increasingly used to bypass browsers’ anti-tracking defenses

2021 will be the year of hybrid working: How can CTOs keep staff secure and productive?

Help Net Security - Daily information security news with a focus on enterprise security.
Follow us
  • Features
  • News
  • Expert Analysis
  • Reviews
  • Events
  • Whitepapers
  • Industry news
  • Newsletters
  • Twitter

In case you’ve missed it

  • Chief Legal Officers face mounting compliance, privacy and cybersecurity obligations
  • How do I select a network monitoring solution for my business?
  • Tips for boosting the “Sec” part of DevSecOps
  • How do I select a DRM solution for my business?

(IN)SECURE Magazine ISSUE 67 (November 2020)

  • Hardware security: Emerging attacks and protection mechanisms
  • Justifying your 2021 cybersecurity budget
  • Cooking up secure code: A foolproof recipe for open source
  • Mapping the motives of insider threats
Read online
© Copyright 1998-2021 by Help Net Security
Read our privacy policy | About us | Advertise